-
1
-
-
84870504149
-
A new efficient privacy-preserving scalar product protocol
-
Darlinghurst, Australia, Australia, Australian Computer Society, Inc.
-
A. Amirbekyan and V. Estivill-Castro. A new efficient privacy-preserving scalar product protocol. In AusDM '07: Proceedings of the sixth Australasian conference on Data mining and analytics, pages 209-214, Darlinghurst, Australia, Australia, 2007. Australian Computer Society, Inc.
-
(2007)
AusDM '07: Proceedings of the Sixth Australasian Conference on Data Mining and Analytics
, pp. 209-214
-
-
Amirbekyan, A.1
Estivill-Castro, V.2
-
2
-
-
1642327704
-
Secure and private sequence comparisons
-
New York, NY, USA, ACM
-
M. J. Atallah, F. Kerschbaum, and W. Du. Secure and private sequence comparisons. In WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society, pages 39-44, New York, NY, USA, 2003. ACM.
-
(2003)
WPES '03: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
, pp. 39-44
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
-
4
-
-
37249011239
-
Lossless compression of chemical fingerprints using integer entropy codes improves storage and retrieval
-
P. Baldi, R. W. Benz, D. Hirschberg, and S. Swamidass. Lossless compression of chemical fingerprints using integer entropy codes improves storage and retrieval. Journal of Chemical Information and Modeling, 47(6):2098-2109, 2007.
-
(2007)
Journal of Chemical Information and Modeling
, vol.47
, Issue.6
, pp. 2098-2109
-
-
Baldi, P.1
Benz, R.W.2
Hirschberg, D.3
Swamidass, S.4
-
5
-
-
34347363148
-
The genographic project public participation mitochondrial DNA database
-
doi:10.1371/journal.pgen.0030104
-
D. M. Behari, S. Rosset, J. Blue-Smith, O. Balanovsky, S. Tzuri, D. Comas, R. J. Mitchell, L. Quintana-Murci, C. Tyler-Smith, and R. S. Wells. The genographic project public participation mitochondrial DNA database. PLoS Genetics, 3(6), 2005. doi:10.1371/journal.pgen.0030104.
-
(2005)
PLoS Genetics
, vol.3
, Issue.6
-
-
Behari, D.M.1
Rosset, S.2
Blue-Smith, J.3
Balanovsky, O.4
Tzuri, S.5
Comas, D.6
Mitchell, R.J.7
Quintana-Murci, L.8
Tyler-Smith, C.9
Wells, R.S.10
-
6
-
-
70349266254
-
FairplayMP - A system for secure multi-party computation
-
New York, NY, USA, ACM
-
A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP - a system for secure multi-party computation. In Proceedings of the ACM Computer and Communications Security Conference (ACM CCS), pages 257-266, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the ACM Computer and Communications Security Conference (ACM CCS)
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
7
-
-
13444256467
-
MITOMAP: A human mitochondrial genome database - 2004 update
-
Database Issue
-
M. Brandon, M. Lott, K. Nguyen, S. Spolim, S. Navathe, P. Baldi, and D. Wallace. MITOMAP: a human mitochondrial genome database - 2004 update. Nucleic Acids Research, 33:D611-D613, 2005. Database Issue.
-
(2005)
Nucleic Acids Research
, vol.33
-
-
Brandon, M.1
Lott, M.2
Nguyen, K.3
Spolim, S.4
Navathe, S.5
Baldi, P.6
Wallace, D.7
-
8
-
-
58349102189
-
MITOMASTER: A bioinformatics tool for the analysis of mitochondrial DNA sequences
-
0
-
M. C. Brandon, E. Ruiz-Pesini, D. Mishmar, V. Procaccio, M. T. Lott, K. C. Nguyen, S. Spolim, U. Patil, P. Baldi, and D. C. Wallace. MITOMASTER: A bioinformatics tool for the analysis of mitochondrial DNA sequences. Human Mutation, 0:1-6, 2008.
-
(2008)
Human Mutation
, pp. 1-6
-
-
Brandon, M.C.1
Ruiz-Pesini, E.2
Mishmar, D.3
Procaccio, V.4
Lott, M.T.5
Nguyen, K.C.6
Spolim, S.7
Patil, U.8
Baldi, P.9
Wallace, D.C.10
-
9
-
-
84948949192
-
Finding a hidden code by asking questions
-
Springer
-
Z. Chen, C. Cunha, and S. Homer. Finding a hidden code by asking questions. In COCOON '96: Proceedings of the Second Annual International Conference on Computing and Combinatorics, volume 1090 of LNCS, pages 50-55. Springer, 1996.
-
(1996)
COCOON '96: Proceedings of the Second Annual International Conference on Computing and Combinatorics, Volume 1090 of LNCS
, pp. 50-55
-
-
Chen, Z.1
Cunha, C.2
Homer, S.3
-
11
-
-
51249185802
-
Mastermind
-
V. Chvátal. Mastermind. Combinatorica, 3(3/4):325-329, 1983.
-
(1983)
Combinatorica
, vol.3
, Issue.3-4
, pp. 325-329
-
-
Chvátal, V.1
-
12
-
-
2042437650
-
Initial sequencing and analysis of the human genome
-
I. H. G. S. Consortium. Initial sequencing and analysis of the human genome. Nature, 409:860-921, 2001.
-
(2001)
Nature
, vol.409
, pp. 860-921
-
-
Consortium, I.H.G.S.1
-
13
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
Springer, S. Halevi and T. Rabin, editors
-
I. Damga°rd, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In S. Halevi and T. Rabin, editors, Theory of Cryptography, volume 3876 of Lecture Notes in Computer Science, pages 285-304. Springer, 2006.
-
(2006)
Theory of Cryptography, Volume 3876 of Lecture Notes in Computer Science
, pp. 285-304
-
-
Damgard, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
14
-
-
35048883385
-
Confluent drawings: Visualizing non-planar diagrams in a planar way
-
Springer-Verlag
-
M. Dickerson, D. Eppstein, M. T. Goodrich, and J. Meng. Confluent drawings: Visualizing non-planar diagrams in a planar way. In Proc. 11th Int. Symp. on Graph Drawing, volume 2912 of Lecture Notes in Computer Science, pages 1-12. Springer-Verlag, 2003.
-
(2003)
Proc. 11th Int. Symp. on Graph Drawing, Volume 2912 of Lecture Notes in Computer Science
, pp. 1-12
-
-
Dickerson, M.1
Eppstein, D.2
Goodrich, M.T.3
Meng, J.4
-
15
-
-
70449677016
-
Protocols for secure remote database access with approximate matching
-
In A. K. Ghosh, editor, Kluwer Academic Publishers
-
W. Du and M. J. Atallah. Protocols for secure remote database access with approximate matching. In A. K. Ghosh, editor, E-Commerce Security and Privacy: Advances in Information Security, Volume 2, pages 87-112. Kluwer Academic Publishers, 2001.
-
(2001)
E-Commerce Security and Privacy: Advances in Information Security, Volume 2
, pp. 87-112
-
-
Du, W.1
Atallah, M.J.2
-
16
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
New York, NY, USA, ACM
-
W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: a review and open problems. In NSPW '01: Proceedings of the 2001 workshop on New security paradigms, pages 13-22, New York, NY, USA, 2001. ACM.
-
(2001)
NSPW '01: Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 13-22
-
-
Du, W.1
Atallah, M.J.2
-
19
-
-
0023545076
-
How to play any mental game
-
New York, NY, USA, ACM
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In STOC '87: Proceedings of the nineteenth annual ACM symposium on Theory of computing, pages 218-229, New York, NY, USA, 1987. ACM.
-
(1987)
STOC '87: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
20
-
-
67349153322
-
On the algorithmic complexity of the mastermind game with black-peg results
-
to appear
-
M. T. Goodrich. On the algorithmic complexity of the mastermind game with black-peg results. Information Processing Letters, ?:to appear, 2009.
-
(2009)
Information Processing Letters ?
-
-
Goodrich, M.T.1
-
21
-
-
0016518550
-
A linear space algorithm for computing maximal common subsequences
-
D. S. Hirschberg. A linear space algorithm for computing maximal common subsequences. Commun. ACM, 18(6):341-343, 1975.
-
(1975)
Commun. ACM
, vol.18
, Issue.6
, pp. 341-343
-
-
Hirschberg, D.S.1
-
22
-
-
45749158543
-
Algorithms for computing variants of the longest common subsequence problem
-
C. S. Iliopoulos and M. S. Rahman. Algorithms for computing variants of the longest common subsequence problem. Theor. Comput. Sci., 395(2-3):255-267, 2008.
-
(2008)
Theor. Comput. Sci.
, vol.395
, Issue.2-3
, pp. 255-267
-
-
Iliopoulos, C.S.1
Rahman, M.S.2
-
23
-
-
50249177701
-
Towards practical privacy for genomic computation
-
Washington, DC, USA, IEEE Computer Society
-
S. Jha, L. Kruger, and V. Shmatikov. Towards practical privacy for genomic computation. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 216-230, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
24
-
-
38549161042
-
A plan to capture human ddveristy in 1000 genomes
-
J. Kaiser. A plan to capture human ddveristy in 1000 genomes. Science, 319:395, 2008.
-
(2008)
Science
, vol.319
, pp. 395
-
-
Kaiser, J.1
-
26
-
-
35648976118
-
The diploid genome sequence of an individual human
-
S. Levy, G. Sutton, P. C. Ng, and et al. The diploid genome sequence of an individual human. PLOS Biology, 5(10):2113-2144, 2007.
-
(2007)
PLOS Biology
, vol.5
, Issue.10
, pp. 2113-2144
-
-
Levy, S.1
Sutton, G.2
Ng, P.C.3
-
27
-
-
24744469980
-
Power laws Pareto distributions and Zipf's law
-
M. Newman. Power laws, Pareto distributions, and Zipf's law. Contemporary Physics, 46(5):323-351, 2005.
-
(2005)
Contemporary Physics
, vol.46
, Issue.5
, pp. 323-351
-
-
Newman, M.1
-
28
-
-
0002114928
-
The rise and fall of knapsack cryptosystems
-
C. Pomerance, editor, Am. Math. Soc.
-
A. M. Odlyzko. The rise and fall of knapsack cryptosystems. In C. Pomerance, editor, Cryptology and Computational Number Theory, pages 75-88. Am. Math. Soc., 1990.
-
(1990)
Cryptology and Computational Number Theory
, pp. 75-88
-
-
Odlyzko, A.M.1
-
30
-
-
33846094306
-
An enhanced MITOMAP with a global mtDNA mutational philogeny
-
Database Issue
-
E. Ruiz-Pesini, M. T. Lott, V. Procaccio, J. Poole, M. C. Brandon, D. Mishmar, C. Yi, J. Kreuziger, P. Baldi, and D. C. Wallace. An enhanced MITOMAP with a global mtDNA mutational philogeny. Nucleic Acids Research, 35:D823-D828, 2007. Database Issue.
-
(2007)
Nucleic Acids Research
, vol.35
-
-
Ruiz-Pesini, E.1
Lott, M.T.2
Procaccio, V.3
Poole, J.4
Brandon, M.C.5
Mishmar, D.6
Yi, C.7
Kreuziger, J.8
Baldi, P.9
Wallace, D.C.10
-
31
-
-
48049104079
-
Privacy preserving set intersection protocol secure against malicious behaviors
-
Washington, DC, USA, IEEE Computer Society
-
Y. Sang and H. Shen. Privacy preserving set intersection protocol secure against malicious behaviors. In PDCAT '07: Proceedings of the Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies, pages 461-468, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
PDCAT '07: Proceedings of the Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 461-468
-
-
Sang, Y.1
Shen, H.2
-
32
-
-
78650226497
-
Privacy preserving set intersection based on bilinear groups
-
Darlinghurst, Australia, Australia, Australian Computer Society, Inc.
-
Y. Sang and H. Shen. Privacy preserving set intersection based on bilinear groups. In ACSC '08: Proceedings of the thirty-first Australasian conference on Computer science, pages 47-54, Darlinghurst, Australia, Australia, 2008. Australian Computer Society, Inc.
-
(2008)
ACSC '08: Proceedings of the Thirty-first Australasian Conference on Computer Science
, pp. 47-54
-
-
Sang, Y.1
Shen, H.2
-
33
-
-
33645072440
-
The race for the $1000 genome
-
R. F. Service. The race for the $1000 genome. Science, 311:1544-1546, 2006.
-
(2006)
Science
, vol.311
, pp. 1544-1546
-
-
Service, R.F.1
-
36
-
-
57049083569
-
Privacy preserving error resilient dna searching through oblivious automata
-
New York, NY, USA, ACM
-
J. R. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik. Privacy preserving error resilient dna searching through oblivious automata. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 519-528, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 519-528
-
-
Troncoso-Pastoriza, J.R.1
Katzenbeisser, S.2
Celik, M.3
-
37
-
-
84976791819
-
Bounds on the complexity of the longest common subsequence problem
-
J. D. Ullman, A. V. Aho, and D. S. Hirschberg. Bounds on the complexity of the longest common subsequence problem. J. ACM, 23(1):1-12, 1976.
-
(1976)
J. ACM
, vol.23
, Issue.1
, pp. 1-12
-
-
Ullman, J.D.1
Aho, A.V.2
Hirschberg, D.S.3
-
38
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
J. Vaidya and C. Clifton. Secure set intersection cardinality with application to association rule mining. J. Comput. Secur., 13(4):593-622, 2005.
-
(2005)
J. Comput. Secur.
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
-
39
-
-
0035895505
-
The sequence of the human genome
-
J. C. Venter, M. D. Adams, E. W. Myers, and P. W. Li et al. The sequence of the human genome. Science, 291:1304-1351, 2001.
-
(2001)
Science
, vol.291
, pp. 1304-1351
-
-
Venter, J.C.1
Adams, M.D.2
Myers, E.W.3
Li, P.W.4
-
40
-
-
0020312165
-
Protocols for secure computations
-
Washington, DC, USA, IEEE Computer Society
-
A. C. Yao. Protocols for secure computations. In Proc. of 23rd Symp. on Foundations of Computer Science, pages 160-164, Washington, DC, USA, 1982. IEEE Computer Society.
-
(1982)
Proc. of 23rd Symp. on Foundations of Computer Science
, pp. 160-164
-
-
Yao, A.C.1
|